Terminal Connections

Some software users attempt to violate licensing terms by purchasing one copy of the application intended for just one user and installing it on a terminal server. If developers do not use safeguards against this license violation scenario, several users can use a single copy of the application via terminal sessions even if the application is protected with a dongle.

One of the ways to limit the number of application copies used simultaneously is traffic encryption by means of session keys, which is implemented in Guardant Sign and Guardant Code. Since a unique traffic encryption key is generated for each user session, only one copy of the protected application can use this session.

Limiting the number of session keys stored in the RAM of the dongle micro controller limits the number of simultaneous active sessions and, by extension, the number of application copies. During pre-sale programming of Guardant Sign and Guardant Code dongles, the developer can specify that the key will store only one session key. As a result, it will be able to serve only one running copy of the protected application, and it will be the only functional copy.

In network dongles, protection against terminal sessions is implemented with the help of a license server.

Guardant Dongles Gallery

  • Guardant Sign
  • Guardant Time
  • Guardant Code
  • Guardant Sign Net
  • Guardant Stealth II
  • Guardant Sign
  • Guardant Time
  • Guardant Code micro
  • Guardant Stealth II micro
  • Guardant Time Net
  • Guardant Sign micro
  • Guardant Time
  • Guardant Code
  • Guardant Net II
  • Guardant Stealth II
  • Guardant Net Family

Sitemap